Online Disk-to-Disk Backup with Veritas NetBackup and VSS
|
|
- Ross Tyler
- 8 years ago
- Views:
Transcription
1 Online Disk-to-Disk Backup with Veritas NetBackup and VSS This solution guide describes how to configure Intransa Large Scale IP SAN storage System with Veritas NetBackup and integrate with VSS for best performance as destination for backups. It also compares the benefits and performance characteristics of backup-to-disk verses backup-to-tape implementations.
2 Intransa, Incorporated. All rights reserved worldwide. Unauthorized duplication or reproduction of this document by any means, including electronic, reprographic, or any other form without written permission from Intransa, Inc., is strictly forbidden. Use of this manual and the software program is subject to the terms of the License Agreement between you and Intransa, Inc. You should not use the software until you have read the License Agreement. By using the software program, you signify that you have read the License Agreement and accept its terms. For a complete explanation of the terms of this agreement, see the License Agreement booklet. Trademarks The Intransa logo, Intransa Storage System, StorControl, StorControl Management Tool, IntraStor, and the Simply Smarter logo are all registered trademarks of Intransa, Inc. Microsoft is a registered trademark of Microsoft Corporation. Windows is a trademark of Microsoft Corporation. Java is a registered trademark Sun Microsystems, Inc. Linux is a registered trademark of Linus Torvalds. Oracle is a registered trademark of Oracle Corporation. All other brand or product names are trademarks or registered trademarks of their respective companies or organization. All names of people and companies used for examples in this manual are fictional. Any similarity to names of real companies and real people is coincidental. Revisions Intransa reserves the right to revise this document and the information within at any time and as necessary without the obligation to notify any person of revision. Contact: Intransa, Inc Zanker Road Suite 200 San Jose, CA Phone: Fax: Web:
3 Contents 1. Executive Summary... 1 Overview...1 Intransa Disk-to-Disk (D2D) Backup Strategy...2 Conclusion Preface... 5 Introduction...5 Disk Backup Overview...5 Advantages of Backup-to-Disk...6 About Intransa...8 Intransa A brief profile...8 Intransa Approach to Solutions...8 About Veritas...10 Users...10 Other Useful Resources Veritas NetBackup Overview...12 About Advanced Client...14 Snapshots NetBackup Qualification Setup Getting Started...16 Assumptions...17 Configurations used in the Qualification Environment Configuring IP SAN Volumes Intransa Large Scale IP SAN Overview:...22 What is an IP SAN?...23 Solution Specific Configurations...24 Windows File System Tuning Installing Intransa VSS Provider Installing NetBackup Server and Client NetBackup Client Installation...58 Contents i
4 8. Testing Backup and Restore Defining Storage Unit...66 Defining Backup Policy...68 Verifying the Snapshot operations Performance Benchmarking Summary Conclusions...88 Summary Appendix A.VSS Concepts...90 A.1 What is VSS:...90 A.2 VSS Components...91 A.3 How VSS works...91 B. Overview to VSS and VDS Design...93 C. Volume Shadow Copy Service...95 D. Tape Backups: Limitations...99 E. Essentials of Veritas NetBackup Administration E.1 NetBackup Management E.2 NetBackup Configuration Wizards E.3 Disk Staging Storage Unit Considerations E.4 Types of Backup E.5 Configuring an Advanced Client Policy Reference and Acknowledgements References Acknowledgements Contents ii
5 1. Executive Summary In a 24x7x365 world with geographic distribution of users, even shrinking back up windows is becoming unacceptable, especially for mission-critical applications. Enterprise environments need up-to-the-minute data protection without sacrificing high availability. Especially in customer centric and service centric organizations, every minute of backup restore is important. In case of outage or disaster every minute of delay in putting back the operations translates into opportunity loss in terms of money, customers and image. In some cases it can be as serious as closing business. Traditionally backup was taken in tape cartridges. However off late, disk capacities have overtaken single tape cartridge capacities. There seems to be a lot of interest by organizations to go for near line storage by deploying disk to disk backup solutions rather than taking directly into tapes. This makes business and economic sense in the whole run. Overview Backup to disk solutions provide tremendous benefits compare to traditional backup-to-tape. These benefits are as follows: Faster recovery of mission critical data Faster restore from disk Greater reliability of the backup media Multiple backup and restore data streams to disk Backup-to-disk is emerging as powerful solution for faster recovery of missioncritical data and it is complementary to backup-to-tape for long term storage. Most of the applications today require frequent retrievals of recently captured data, as well as the need for backup of business critical data which is required to be preserved and retrieved quickly and efficiently. Today most of the leadingedge customers prefer using disk as the destination for nearline, faster backup as backup windows are shrinking and importance of data is increasing every day. 1. Executive Summary - 1
6 Advanced Technology Attached (ATA) disk technology provides greater benefits over traditional tape with the increasing performance and reducing cost of disk. Disk-based backups will not replace tape, but will definitely shift tape into an archival role. Both of these media will co-exist. Today, Intransa recommends adopting a backup-to-disk solution when performance and data reliability are the primary concerns of the customer. Intransa Disk-to-Disk (D2D) Backup Strategy Intransa has developed Large Scale IP SAN that is built around a set of modular components to deliver exceptional value, low total cost of ownership, high scalability, excellent performance, and built-in redundancy & reliability. These requirements define IntraStor architecture, our foundation for delivering block-level, distributed storage over IP-networks. Intransa IntraStor is a 3-tiered distributed architecture that fully leverages the ubiquity of IP infrastructure and the iscsi protocol to deliver intelligent, networked block-level storage. This offers the flexible scalability options in scaling up the storage capacity or storage throughput I/O performance or both. This solution of Disk-to-Disk backup is using Veritas NetBackup software and Intransa VSS Provider software. Intransa offers the flexibility in performing the backup from the snapshot. Intransa VSS Provider smartly takes care of creating snapshot of the production data volume during the backup operations and deletes the snapshot after completing the backup. This reduces the burden of backup from the Production data volume and keeping it free only for the production purpose. Intransa s scalable architecture offers the unique combination linear scalability in performance and capacity in pay as you grow mode. This paper gives an overview of how to deploy Disk-to-Disk Backup Solution on Intransa Large Scale IP SAN using Veritas NetBackup and Intransa VSS Provider. 1. Executive Summary - 2
7 The paper is lucidly divided into the following logical sections: Section 2 is Preface gives introduction and brief need of the Solution. It also covers brief profiles about Intransa and Veritas. Section 3 provides the overview of Veritas NetBackup Software, its architecture, basic functionality. Section 4 provides the overview of Veritas NetBackup Qualification configurations setup and brief specifications of the servers used in the qualification environment. Section 5 provides the overview of Intransa Large Scale IP SAN and step-by-step guide in configuring the IP SAN Volumes for the Disk-to-Disk Solution. Section 6 provides step-by-step instructions for installing and configuring the Intransa VSS Provider software for the Disk-to-Disk backup Solution. Section 7 provides step-by-step instructions for Installation and configuring NetBackup Server and Clients for the Solution using the snapshot feature. Section 8 provides brief about defining the Disk Storage Unit, Backup Policy for using the snapshot feature for the solution and also provides the steps for conducting the backup and restore operations Sections 9 provides the performance benchmarks for the backup & restore tests conducted. Section 10 provides summary of the solution and the conclusions of the tests. Section 11 is the appendix containing the additional information about the components used in the solution. Brief concepts of Microsoft Virtual Shadow Copy Service. Brief essentials of Veritas NetBackup Software, backup types and some useful guidelines and suggestions in configuring the solution. 1. Executive Summary - 3
8 Section 12 is about the references used for this solution document and acknowledging the teams involved in formulating this solution. Conclusion The performance characteristics are very encouraging. It shows that backup windows can typically shrink by 3 times or reduce back up times by 66 % compared to the fastest LTO based solutions in the market. Veritas NetBackup Software seamlessly gets integrated with the Intransa VSS Provider. This gives immense benefit for configuring the Disk-to-Disk Backup Solutions with Intransa IP SAN in using the automated snapshot feature. A D2D solution of the nature proposed will benefit the IT staff to increase the numbers of backups or simply ease the management and cost of backups. This also insures that the backups are always near online and easily accessible. 1. Executive Summary - 4
9 Introduction 2. Preface This solution guide explains implementing backup-to-disk technology with Veritas NetBackup and the advantages over traditional tape based backup. These implementations have been tested by Intransa Solution Engineering teams. This document contains information relating to configuring Veritas NetBackup and Intransa IP SAN, Intransa VSS provider to form the backup-to-disk solution. It also compares performance with the traditional tape backups. Intransa Solution Engineering teams performed tests using specific system configurations. Due to variations in hardware, software, compressibility of data system usage and other factors, backup rates achieved in some situation may be different than those shown herein. All testing performed by the Solution engineering teams used the most up-to-date backup software available at that time. Other versions of these applications any yield other results. Disk Backup Overview Traditionally, backup software was created to write to a tape device. Today, most backup software products also support write to disk, which means writing to disk file in a file system. The file system may be on a Windows, Netware or UNIX platform, depending on the backup server. Disk-based RAID configurations enhance data protection beyond what tape can provide. Backup and restore time using disk provides customers an advantage over using traditional tape. Disk drives are random access devices and can instantly start to transfer the files, whereas with tape, the tape must be loaded and then accessed, increasing the overall time. File system overhead and tape with on-board compression add more time lags. Under normal conditions, I/O will always go to physical disk. Performances are characterized by the physical disk rotational speed and seek time together with the file system characteristics. Using a larger file system block size or allocation unit size may improve performance of disk backups by using larger contiguous 2. Preface - 5
10 address space for files because the operating system allocates fewer groups of contiguous sectors. Benefits of IP SAN disk-based backups that are discussed in more detail in this solution document include: Random access characteristics of disk versus sequential access for tape simultaneous capability to read/write to disk. Multiple host data streams Disk performance compared to tape performance with compression. Aggregate performance RAW disk performance Advantages of Backup-to-Disk Traditionally, tape has been the backup medium of choice, due to its cost-per-mb advantages compared with disk. However the economics of disk narrowing that gap. The advantages of using disk over with backup solutions can be grouped into four major categories: Backup performance Restore performance Media reliability and data availability Overall IT efficiency. The following sections summarize these benefits. Backup Performance IP SAN storage systems based backup are much faster than tape drives. Some tape technologies respond to a minimal data stream by shoeshining or excessive positioning. Disks do not experience this behavior as they are inherently random access. 2. Preface - 6
11 Restore Performance Data Recovery from disks are much faster than tape. The difference can be seconds or minutes, verses hours with tape. Disk supports random and sequential access. Tape support sequential access only. This enables faster access to data files, improving overall performance. If data is on several tape cartridges, the following steps are required to restore the data: 1. Each tape must be mounted by the library (up to a minute per tape) 2. Tape must load (30 seconds to a few minutes ) 3. Tape must be positioned to the desired data ( an average access time is a few minutes ) 4. Tape must be rewound and unloaded ( 30 seconds to a few minutes ) 5. Load the next tape and repeat cycle. Time to first byte takes milliseconds for disk versus seconds to minutes to tape. Media Reliability and Data Availability Media-specific errors, including faulty tape media, are reduced. Disk system RAID protection prevents data unavailability or data loss in the event of a disk drive failure. Tape handing is reduced or eliminated. Maintaining a set of tapes from a tape library can be problematic and requires properly trained personnel. Overall IT Efficiency Disk does not require the tape handling /positioning and RAID protection makes it inherently more reliable. There is less need to perform frequent full backups. Fewer backups need to be performed, saving network and CPU load. Tape undergoes a technology shift every three years, so a conversion process from old to new media must be undertaken at that interval. Disk technology does not go through these types of transitions since the format of the data is not changed as it is with tape technology. New larger-capacity disk drive reduces floor space requirements compared with equivalent-capacity tape libraries. 2. Preface - 7
12 About Intransa Intransa A brief profile Founded in September 2000, Intransa is an innovator of enterprise-class, intelligent IP storage products and software. Based on technology that leverages the low cost and maturity of Ethernet technology, Intransa s IP SAN solutions dramatically reduce the cost and complexity of deploying scalable network storage. Intransa s products re-define network storage to deliver the first fullfeatured IP SAN at a price attractive to organizations. Intransa believes that network storage should be easy, dynamic and intuitive. By achieving these goals, Intransa is enabling business customers to focus their resources onto missioncritical projects to improve their business. Intransa s new IP SAN Storage System is a second-generation iscsi-enabled, networked storage solution that implements the IntraStor architecture. This solution offers low cost, block-level, networked storage that can be deployed anywhere on the IP network and managed centrally. The enterprise-class features, such as fail-over and load balancing, support the high-availability needs of online data. The policy-based virtual volume management and dynamic volume expansion capabilities, in conjunction with the Intransa s inexpensive disk storage pool, simplify capacity management and improve capacity utilization for online, nearline, and backup/restore staging applications. Intransa s snapshot capability allows many point-in-time virtual copies of data, representing days and weeks of data, thereby obviating the need to incrementally backup to tape on a daily basis. Intransa Approach to Solutions Intransa, with its partners, is focused and committed, to delivering Solutions to market that allows customers to implement end-to-end storage solutions. The Solutions are targeted to meet demanding customer needs. 2. Preface - 8
13 Intransa s solution leverage on the simplicity, scalability and flexibility of the IntraStor Architecture. IntraStor architecture is an enabler for a solutions-based platform. The above figure gives a conceptual overview of the N-way Scaling in performance and capacity. The following approach is helping Intransa to rapidly build a growing and satisfied client base all over the world. Create a storage network as you would create your client/server (data) network Leverage your existing IP infrastructure for solutions such as Disaster Recovery Leverage existing IP expertise and resources in organization Minimize the number of disparate networks that organizations have to manage and support Increase return on your investment via Simplicity of Scaling the IntraStor architecture and solution Intransa has various families of products like IP3000, IP5500 and IP7500 to address storage, price, performance and availability requirements of the customer. These scalable solutions use IP as a storage medium and can be scaled to more than 50 TB. The N-way clustering of Storage Controllers help in scaling 2. Preface - 9
14 up the performance on demand. Intransa will continue to develop value add features that allows our customers to take advantage of the IP network investment that they have already made. For more details about Intransa please visit About Veritas VERITAS Software is a leading provider of software and services to enable utility computing. In a utility computing model, IT resources are aligned with business needs and business applications are delivered with optimal performance and availability on top of a shared computing infrastructure, minimizing hardware and labor costs. The VERITAS NetBackup mission is to provide heterogeneous data protection solutions ranging from the workgroup or departmental level to the enterprise level. The NetBackup Enterprise Server product provides powerful functionality, flexibility, mainframe-caliber robustness, and high performance in large enterprise environments. The NetBackup Server product is a high-performance solution offering ease of use and functionality that is appropriate to smaller work environments. NetBackup contains many significant enhancements in the area of scalability, application protection, clustering, advanced client and off-host backups, and integration with VERITAS Backup Exec. For more details about Veritas please visit Users This guide is intended to be used by Backup, System and network administrators. Throughout this document we assume basic understanding of: Local Area Networks (LAN) Ethernet and Ethernet-switching concepts Storage Area Network (SAN) Backup and System Administration 2. Preface - 10
15 Other Useful Resources Intransa IP SAN Administrator s Guide. Intransa IP SAN Command Line Interface Guide. Intransa IP SAN StorControl Management Tool Guide. Veritas NetBackup Installation Guide Veritas NetBackup System Administration Guide Veritas NetBackup Advanced Client Quick Start Guide 2. Preface - 11
16 3. Veritas NetBackup This section provides brief introduction of Veritas NetBackup software, architecture, functionality and basics of snapshot. Overview Veritas NetBackup is based on client/server architecture. Each NetBackup client and server belongs to a storage domain. A storage domain consists of a single master Server, its associated Media Servers and NetBackup clients. The Master Server controls and directs all NetBackup operations in its storage domain. Each Media Server controls the backup devices it is connected to, including direct-attach and SAN devices. A Media server can have only one Master Server, but a Master Server can control more than one Media Server. The NetBackup clients are any systems containing data to be backed up. A Master Server can act as a Media Server, and are capable of being clients. A NetBackup client is any system with data to be backed up. The client software is tailored to the operating system on which it is installed. Normally, a client operates under the control of the Master Server according to the rules and schedules that an administer establishes. A backup client accesses the storage media through a Media Server. A NetBackup Media Server hosts one or more backup devices. Storage devices on the same SAN can be shared between Media Servers using the Shared Storage Option (SSO). The Master Server directs a client to send its data to a Media Server for backup. SSO does not support disk devices. A NetBackup Master Server is the manager of the storage domain. An administrator can control all NetBackup functions in the storage domain from the Master Server. NetBackup provides high-performance backups and restores for a variety of platforms, including Microsoft Windows, UNIX, and NetWare systems. 3. Veritas NetBackup - 12
17 Administrators can set up schedules for automatic, unattended backups for clients anywhere in the network. These backups can be full or incremental and are managed entirely by the NetBackup master server. Users can start backups and restores from the computer where they are working. A user can also archive files. An archive operation backs up a file and then deletes it from the local disk if the backup is successful. Once started, user operations are managed by the NetBackup server. NetBackup s Media Manager software manages the media and storage devices. Robots require no intervention on the part of the administrator, operator, or the user. Standalone drives (those not in a robot) that contain appropriate media also require no intervention. NetBackup includes both the server and client software: Server software is on the computer that manages the storage devices. Client software is on the computer whose data you want to back up. A server also has client software and can be backed up like other clients. NetBackup supports both master and media servers. The master server manages the backups, archives, and restores. Media servers provide additional storage by allowing NetBackup to use the storage devices that they control. Media servers can also increase performance by distributing the network load. 3. Veritas NetBackup - 13
18 During a backup or archive, the client sends backup data across the network to a NetBackup server that has the type of storage specified for the client. The storage requirement is specified during NetBackup configuration During a restore, users can browse and then select the files and directories that they want to recover. NetBackup finds the selected files and directories and restores them to the disk on the client. About Advanced Client Advanced Client option is required for taking the snapshots and Veritas NetBackup integration with Intransa VSS Provider. Advanced Client combines the features of snapshot backup, FlashBackup, BLI Agent, offhost backup, and Instant Recovery. Snapshots A snapshot is a disk image of the client s data made almost instantaneously. NetBackup backs up the data from the snapshot image, not directly from the client s primary data. This allows client operations and user access to continue without interruption during the backup. A snapshot image is required for all features of Advanced Client. A number of methods are provided for creating snapshots. You can select the snapshot method manually from the Policy dialog of the NetBackup Administration Console, or allow NetBackup to select the method for you. Snapshot Basics Large active databases or file systems that must be available around-the-clock are difficult to back up without incurring a penalty. Often, the penalty takes one of two forms: The entire database is taken offline or the file system is unmounted, to allow time for the backup, resulting in suspension of service and inconvenience to users. The copy is made very quickly but produces an incomplete version of the data, some transactions having failed to complete. A solution to this problem is to create a snapshot of the data. This means capturing the data at a particular instant, without causing significant client downtime. The resulting capture or snapshot can be backed up without affecting the performance or availability of the file system or database. Without a complete, up-to-date snapshot of the data, a correct backup cannot be made. 3. Veritas NetBackup - 14
19 When a backup is managed by a backup agent on a Storage network, the data to backup must be contained in a snapshot. The backup agent can only access the data by means of the raw physical disk. Once the data is captured as a snapshot, the NetBackup client maps the logical representation of the data to its absolute physical disk address. More details about administering the NetBackup Server and Microsoft s Volume Shadow copy Service (VSS) frame work along with related technical details are covered on Appendix. 3. Veritas NetBackup - 15
20 4. NetBackup Qualification Setup This section provides guidelines and in setting up the servers for Configuring the IP SAN volumes and Configuring Veritas NetBackup Server and Client to provide Disk-to-disk backup using Microsoft VSS framework. This section also provides brief specifications of the servers used in the qualification environment. Getting Started Before beginning the setup process, make sure you have gathered the following equipment and necessary information: Intransa IP SAN along with Intransa VSS Provider Software. The Veritas NetBackup Software Enterprise Edition (Version 5) with its Advanced Client license. Windows 2003 Server with ServicePack-1, a Gigabit NIC and Microsoft iscsi initiator. One other NIC for management interface. Network settings specific to your network, such as: IP addresses, Network setting, Netmask setting, and Gateway setting. Network Switches with proper V-LAN configurations. 4. NetBackup Qualification Setup - 16
21 Assumptions It is assumed that the following conditions exist before proceeding with the setup procedure: NetBackup Server (NS) and NetBackup Client (NC) are installed with Windows 2003 Enterprise Edition with Updated Service Packs. NS and NC are configured with Intel Gigabit Ethernet NIC with Microsoft initiators to connect to the Host Access Network (HAN) of IP SAN. The setup machines have two network adapters: One Gigabit adapter to connect to the iscsi Network of IP SAN. Second adapter to connect the NS, NC and other Client machine for backup management traffic on LAN switch. Gigabit Ethernet Switch is used to connect the NS and NC to Host Access Network of IP SAN. Jumbo frames are enabled on the Storage Data Network (SDN) GigE switch. 4. NetBackup Qualification Setup - 17
22 The proposed D2D solution comprises of the following architecture: The NetBackup Server (NS) is installed on an independent server and connected IP SAN for taking the backup on the disk. The NetBackup Clients utilizes IP SAN volumes to host the data. The IP SAN provides the snapshot taking capability through built-in snapshot feature in the StorControl Software and Intransa VSS Provider software installed on the NC of which backup is to be taken. 4. NetBackup Qualification Setup - 18
23 NetBackup Server provides scheduling and management functionality for initiating snapshots, scheduling the backup/restore operations, and deleting snapshots. In the above architecture, the backup data traffic flow from the IP SAN Snapshot Volume mounted on NC to the IP SAN netbackup volume. The data backup occurs from snapshot volumes (provided by IP SAN) mounted at the Client to a backup volume on the IP SAN. Configurations used in the Qualification Environment Following is the qualification environment configured for the evaluation. Servers The configurations used in qualification environment are two Pentium 4 servers connected via Intel GigE Ethernet Adapter on LAN. NetBackup Server (NS) Pentium 4 server named as Rasgulla is configured as NetBackup Server. NetBackup Client (NC) Pentium 4 server named as Jupiter is configured as NetBackup Client. Both machines are connected to Intransa large scale IP SAN storage via Gigabit Ethernet NIC with Microsoft iscsi initiator Networks There are three types of Networks involved in the configurations 1. LAN: Local Area Network Gigabit Ethernet LAN switch: It is used for establishing the connectivity between the Servers and LAN Clients. 2. HAN: Host Access Network Gigabit Ethernet HAN switch: The connectivity between the IP SAN Host Access Network (HAN) and NetBackup Servers is done using the HP Gigabit Switch (HP procurve switch 2824) with no jumbo frame support. 3. SDN: Storage Data Network Gigabit Ethernet SDN switch: Storage Data Network (SDN) is comprises of ETH3 and ETH4 network ports of storage controllers and connections from the each Disk 4. NetBackup Qualification Setup - 19
24 Software Enclosures. This is connected using Foundry EdgeIron 48G switch with jumbo frame enabled on the switch. Windows 2003 Server Enterprise Edition with updated service pack and NTFS file system is installed on NS & NC machines. VERITAS NetBackup Server for Microsoft Windows Version 5.0 Intransa VSS Provider software. Volumes IP SAN Volume namely netbackup is configured using NTFS-Optimized custom policy (which is described latter in the document) for taking the backup. Also IP SAN Volume namely source1 to source 10 are created using simple stripe policy and used as source volumes for backup. Volume netbackup is assigned to Netbackup Server Rasgulla via Storage Controller Module (SCM 1) and Source volumes are assigned to Netbackup Client Jupiter via Storage Controller Module (SCM 2) Data Set of 10 GB streaming datasets are prepared on the NetBackup Client (Jupiter) as source data for backup. 4. NetBackup Qualification Setup - 20
25 Qualification Configuration in brief is in given in Table 1 below. Table 1 : No. Item Configuration NetBackup Server and Client 1 Processor Pentium 4, 2.4 GHz Server with single CPU 2 Memory 1 GB (DDR266) 3 Local Hard disk 40 GB ATA 4 Network card Intel Pro Ethernet NIC 5 Host Based Adapter Intel Pro GigE Ethernet NIC with Microsoft iscsi initiator IP SAN : Intransa IP Storage Controller Module 2 X SC5500 in cluster mode with build Disk Enclosure 1 X DE5200 (16 X 250 GB Maxtor ATA disk drives) 9 Operating System Windows 2003 Server Enterprise Edition and Service Pack 1 10 Host Access Network 12 Storage Data Network HP procurve switch 2824 Foundry EdgeIron 48G 13 Veritas Veritas NetBackup Server Intransa VSS Provider Software 15 Data 10 GB streaming data 4. NetBackup Qualification Setup - 21
26 5. Configuring IP SAN Volumes Intransa Large Scale IP SAN Overview: IP SAN overview 5. Configuring IP SAN Volumes - 22
27 What is an IP SAN? The IP SAN is an iscsi-based storage system. It provides a large, scalable, easily managed pool of storage. The IP SAN is the best of both worlds: the block-level abilities of a Storage Area Network (SAN), and the simplicity and cost benefits of a Network Attached Storage (NAS) device. In other words, it s Simply Smarter. The IP SAN is more flexible than a traditional Fibre Channel SAN. It communicates with host application servers using the iscsi protocol over Ethernet, rather than Fibre Channel, allowing for less costly Ethernet switches and tighter integration with an existing network. The IP SAN connects the components by switched Ethernet connection, allowing drive capacity and Storage Controller Modules to be managed independently. The IP SAN is the perfect solution for decentralized, growing, and dynamic storage needs. It includes a scalable number of IP-addressable Storage Controller Modules and a scalable number of IP-addressable disks, which form a logical unit called a Realm. A Realm is an administrative domain made up of a set of designated Storage Controller Modules, Disk Enclosures, associated software and network interconnects. The Storage Controller Modules within a Realm are managed by the StorControl software as a single pool of controllers, except in cases of single- Storage Controller Module systems. The storage space provided by the Disk Enclosures within a Realm is managed by the StorControl software as a single virtual pool of storage space. The Realm is the entirety of the managed system: each part of the system comes together to become the Realm. You manage the Realm as a single entity by managing its components. Storage traffic moves from your Initiator to the IP SAN via an Ethernet (GigE) switch. By having a centrally-managed system, you can create easily managed volumes for your users. Here s how it works: Small Computer System Interface over IP (iscsi) uses standard IPaddressable Ethernet connections for interaction between components. The Initiator uses a standard network interface card (NIC) with a software iscsi driver OR a hardware-based HBA with driver. SC5500 Storage Controller Modules send requests and responses through a GigE (Ethernet) switch, handling traffic to the Initiator and the Disk Enclosure. Acting together, the Intransa modules shown in Figure above create an intelligently managed, single, unified system of interactive parts. The benefits of this are: 5. Configuring IP SAN Volumes - 23
28 Shared arrays of inexpensive disks A modular, shared processor pool, simplifying shared storage; storage is added and removed as needed A switched GigE Ethernet infrastructure Unified management simplifies IP SAN administration Both graphical and command line-based management interfaces High availability: system-wide failover is handled automatically with minimal need for administrator intervention. Solution Specific Configurations Virtual volumes are configured on the Intransa Large Scale IP SAN one for Backup for NetBackup Server named netbackup and other named source1 to source5 on NetBackup Client as a source for data operations in such a way that they will occupy the separate set of disks. To setup the volumes follow the following steps: Step 1: Create policy for creating the volumes To create policy: Logon to StorControl command line using the realm mgmt IP Create a Policy using the below StorControl> Policy create name = NTFS-Optimized virtualdisktype = RAID10 numberofstripemembers = 3 stripeelementsize = 64 Step 2: Volume Creation Backup Volume (named netbackup ) Volumes can be created using graphical user interface (GUI) or by using the command line interface. Both of these methods are demonstrated one by one. Part I: Volume Creation using CLI. StorControl> volume create blocksize = 512b policy = NTFS- Optimised size = 100GB name=netbackup virtualdiskplacement = new Response: Successful 5. Configuring IP SAN Volumes - 24
29 Part II: Volume Creation using GUI Logon to StorControl GUI using the realm management IP, admin user and appropriate password. Create a Volume using the below Right click on All Volumes for popup menu 5. Configuring IP SAN Volumes - 25
30 Use iscsi compliant naming convention for volumes Set RAID level through policy Select correct unit for desired volume size Placement - performance versus space efficiency 512-byte block size best for most applications on Microsoft Windows platform Initialize zeros-out blocks volume is created on 5. Configuring IP SAN Volumes - 26
31 Assign initiator to the Volume Confirm new volume parameters 5. Configuring IP SAN Volumes - 27
32 Volume is created and given an iscsi Qualified Name (IQN) Now go to the NetBackup Server ( Rasgulla ). Install the Microsoft iscsi Initiator software. Double click on the Microsoft iscsi Initiator icon Available Targets will show the assigned target status as Inactive 5. Configuring IP SAN Volumes - 28
33 Log on to the Target. After log on you will see the target status changed to Connected 5. Configuring IP SAN Volumes - 29
34 Now open the Computer Management window 5. Configuring IP SAN Volumes - 30
35 Windows File System Tuning Windows system create a 63-sector hidden are on disk to house the Master Boot Record (MBR). This cause all I/O in the file system made on the subsequent partition to be misaligned ( not on a 256KB boundary), and therefore I/O performance will suffer. By using a program called diskpar,available on the Windows Resource kit, you can alter the number of hidden block to a larger number so that the disk array I/O are aligned and better optimized. We now have initialized basic raw disks. Query the partition information using the diskpar i command. (In this example, we installed the diskpar utility in a Windows utility directory on the C: drive.) This indicates the disk is accessible. C:\Documents and Settings\Administrator>diskpar -i Drive 1 Geometry Information ---- Cylinders = TracksPerCylinder = 255 SectorsPerTrack = 63 BytesPerSector = 512 DiskSize = (Bytes) = (MB) End of partition information. Total existing partitions: 0 C:\Documents and Settings\Administrator>diskpar -s 1 Set partition can only be done on a raw drive. You can use Disk Manager to delete all existing partitions Are you sure drive 1 is a raw device without any partition? (Y/N) y ---- Drive 1 Geometry Information ---- Cylinders = TracksPerCylinder = 255 SectorsPerTrack = 63 BytesPerSector = 512 DiskSize = (Bytes) = (MB) We are going to set the new disk partition. All data on this drive will be lost. Continue (Y/N)? y Please specify starting offset (in sectors): 64 Please specify partition length (in MB) (Max = ): Done setting partition New Partition information ---- StatringOffset = PartitionLength = HiddenSectors = Configuring IP SAN Volumes - 31
36 PartitionNumber = 1 PartitionType = 7 You now should use Disk Manager to format this partition Verify the partition information. (Notice the starting offset is and the number of hidden sectors is 64.) C:\Documents and Settings\Administrator>diskpar -i Drive 1 Geometry Information ---- Cylinders = TracksPerCylinder = 255 SectorsPerTrack = 63 BytesPerSector = 512 DiskSize = (Bytes) = (MB) ---- Drive Partition 0 Information ---- StatringOffset = PartitionLength = HiddenSectors = 64 PartitionNumber = 1 PartitionType = 7 End of partition information. Total existing partitions: 1 Now right click on the new volume and select the following options one by one 5. Configuring IP SAN Volumes - 32
37 Mark Partition as active. Change Drive letter and Paths and select the appropriate drive letter. Format : Format with o Volume Label : NetBackup Volume o File System : NTFS o Allocation unit size: Default Perform a quick format In the similar fashion create volume Source1 to Source5 on the IP SAN and assign it to NetBackup Client (Jupiter) StorControl> StorControl> volume create blocksize = 512b policy = stripe size = 10GB name=source1 virtualdiskplacement = new Response: Successful 5. Configuring IP SAN Volumes - 33
38 6. Installing Intransa VSS Provider Successful Installation of Windows 2003 Operating systems with Gigabit Ethernet NIC and Microsoft iscsi initiator will lead to installation and configuration of Intransa VSS Provider software on the NetBackup Client machines (Jupiter). The Intransa VSS Provider is instrumental in talking to Intransa IP SAN for creating snapshots of the source production volumes. Backup will be performed from the snapshot and after the backup snapshot will be automatically removed from the IP SAN. Copy the Intransa VSS Provider software. Double click on the executable. Click Next 6. Installing Intransa VSS Provider - 34
39 Enter the User name and Organization Click Next 6. Installing Intransa VSS Provider - 35
40 Click Install 6. Installing Intransa VSS Provider - 36
41 Click Finish. Now You have successfully installed Intransa VSS Provider This will create the icon on the desktop. Now double click on it for Intransa VSS Configuration. Specify the Startup type as Automatic Specify the Realm iscsi target IP address, its User account and password. Click Add realm. 6. Installing Intransa VSS Provider - 37
42 Click OK Congratulations!! You have successfully completed the Installation and configuration of Intransa VSS Provider for the target Realm 6. Installing Intransa VSS Provider - 38
43 7. Installing NetBackup Server and Client The volumes are available for Veritas NetBackup installation and configuration. We presume the VSS installed successfully without any error. Up until now we have configured netbackup volume and source volumes on the Intransa IP SAN. Also assigned them to hosts and formatted them for use. You have also successfully installed and configured the Intransa VSS provider software on NC. The following section explains about how to install Veritas NetBackup Software. Now we are going to install the Veritas NetBackup Software and configure the server and clients. Following are the simple steps to achieve this goal. Installing the Veritas NetBackup Software. Put the Veritas NetBackup Software media in the NS. Click on the NetBackup Installation. 7. Installing NetBackup Server and Client - 39
44 Click on Install Server Software. Click OK 7. Installing NetBackup Server and Client - 40
45 Click on I accept the terms of the license agreement. Select Install to this computer only and click Next. 7. Installing NetBackup Server and Client - 41
46 Enter the License Key and Select the NetBackup Master Server. Select Custom and click Next. 7. Installing NetBackup Server and Client - 42
47 Select the NetBackup, NetBackup Debugger Symbols and select all options under it. Note: Do not select the Veritas Snapshot Provider option since we are going to use the Intransa VSS Provider software for taking the snapshots. Click Next 7. Installing NetBackup Server and Client - 43
48 Select Use the built-in system account, In Startup select Automatic and select Start NetBackup Server Services After Install. Note: Do not modify the Default Ports except under unusual circumstances. Click Next 7. Installing NetBackup Server and Client - 44
49 Now Enter the Master Server Name. In this case it is rasgulla configured as NetBackup Server. Click Next Click Install 7. Installing NetBackup Server and Client - 45
50 Click Finish This completes the installation of the Veritas NetBackup Software. 7. Installing NetBackup Server and Client - 46
51 Now the NetBackup Configuration wizard will start automatically. This will help us in configuring the NetBackup Server. Click Next. Click Next. 7. Installing NetBackup Server and Client - 47
52 Click Next. In Device Hosts select rasgulla 7. Installing NetBackup Server and Client - 48
53 Click Next. Note: Since IP SAN disks are not come in to the category of removable media devices, Device Configuration Wizard will not find it and gives following error Click OK. 7. Installing NetBackup Server and Client - 49
54 Click Next. Click Next. 7. Installing NetBackup Server and Client - 50
55 Click Next. Click Finish. 7. Installing NetBackup Server and Client - 51
56 Click Next. Click Next. 7. Installing NetBackup Server and Client - 52
57 Click Next. Click Next. Please specify the full path for the Catalog backups are to be saved 7. Installing NetBackup Server and Client - 53
58 Click Next. Click Next. 7. Installing NetBackup Server and Client - 54
59 Click Finish. 7. Installing NetBackup Server and Client - 55
60 Now configuration wizard will start with Backup Policy Configuration. Click Next. Click Next. 7. Installing NetBackup Server and Client - 56
61 Click OK. This completes the Veritas NetBackup Server Software installation. Now we have start with the Veritas NetBackup Client Software installation on NetBackup Client machine Jupiter 7. Installing NetBackup Server and Client - 57
62 NetBackup Client Installation The following section explains about how to install Veritas NetBackup Software on NetBackup Client machine.now we are going to install the Veritas NetBackup Software and configure the client. Following are the simple steps to achieve this goal. Installing the Veritas NetBackup Software. Put the Veritas NetBackup Software media in the NS. Click on NetBackup Installation 7. Installing NetBackup Server and Client - 58
63 Click on Install Client Software Click OK 7. Installing NetBackup Server and Client - 59
64 Click Next Click on the I accept the terms of the license agreement. 7. Installing NetBackup Server and Client - 60
65 Click on the Install to this computer only. Click Next Select Custom Click Next Note: Do not select the Veritas Snapshot Provider option since we are going to use the Intransa VSS Provider software for taking the snapshots. 7. Installing NetBackup Server and Client - 61
66 Click Next 7. Installing NetBackup Server and Client - 62
67 Click Next Click Next 7. Installing NetBackup Server and Client - 63
68 Click Next Click Next Click Install 7. Installing NetBackup Server and Client - 64
69 Click Finish This completes the Veritas NetBackup Client Installation. In the next section we will test the backup and restore operations. 7. Installing NetBackup Server and Client - 65
70 8. Testing Backup and Restore Successful Installation of NetBackup Server and Client software will lead to define the storage units and proper policy for taking the backup from the snapshot. While configuring NetBackup Server please take maximum care of defining proper policy, storage units, Retention etc. Defining Storage Unit Right Click on Storage Unit 8. Testing Backup and Restore - 66
71 Select New Storage Unit Fill in the relevant details and click OK Similarly you can create multiple disk storage units to suite your backup needs. 8. Testing Backup and Restore - 67
72 Defining Backup Policy Successful Installation of NetBackup Server and Client software along with defining storage units will lead to define the proper policy for taking the backup from the snapshot. Give appropriate Policy name eg. snapshot1 Click OK 8. Testing Backup and Restore - 68
73 Click Next Click Next 8. Testing Backup and Restore - 69
74 Specify clients for this policy. Click Add and enter the name of client Jupiter and click Next. 8. Testing Backup and Restore - 70
75 Click Next Now specify files and folder to backup. Click Add and enter drive name eg. D: 8. Testing Backup and Restore - 71
76 Define Backup Type, viz. Full Backup, Incremental Backup and User Backup. 8. Testing Backup and Restore - 72
77 Note: Please refer to appendix for more details about the backup types Specify the Rotation. Click Next Specify the time window during which backups are allowed to start Click Next 8. Testing Backup and Restore - 73
78 Click Finish Now double click on the snapshot1 policy and mark the box Perform snapshot backups for performing the backup operations from snapshots. Also mark the Allow multiple data streams for performing multiple backups 8. Testing Backup and Restore - 74
79 This is an important step in defining snapshot based backup method 8. Testing Backup and Restore - 75
80 Click on Clients tab to see the clients 8. Testing Backup and Restore - 76
81 Click on Backup Selections tab to see the volumes to be backup Click OK. Now it will validate the policy. It will give an error is policy is not proper. 8. Testing Backup and Restore - 77
82 Now click on the newly created snapshot1 policy and click on Manual Backup to start the backup immediately. Select Schedules and Clients and click OK Click OK 8. Testing Backup and Restore - 78
83 Now click OK to open the Activity Monitor. Now monitor the progress of the job using the Activity Monitor on NetBackup Server. Following Job Details window will give Job Overview and Detailed Status as shown below 8. Testing Backup and Restore - 79
84 Verifying the Snapshot operations The snapshot operation can be verified from the Intransa StorControl window. Following steps and screenshots demonstrate the same. Open the StorControl window Click on source1 volume. In General tab section shows the camera type icon on the volume. Indication the snapshot is initiated. All snapshots tab shows the snapshot volume for source1 volume connected to Jupiter in the Assigned initiator tab. 8. Testing Backup and Restore - 80
85 Congratulations!! You have successfully taken the backup from the snapshot volume. Following screen shot shows the backup operation is successful. 8. Testing Backup and Restore - 81
86 This will verify the snapshot operation. After the Backup completes the snapshot volume automatically gets deleted. Similarly you can create the multiple policies to suit your backup needs. Note: Please refer to Appendix for guidelines for defining the backup policies. Restore Operation The Backup data can be restored using the Backup, Archive and Restore Window Open the Backup, Archive and Restore Window on NetBackup Client or Server Select the folders or files to be restored and click on icon to Start Restore of Marked files. If the data is backed using the snapshot policy then we need to restore it to the source volume using the option Restore everything to a different location and specifying the appropriate Destination Path 8. Testing Backup and Restore - 82
87 Click on Start Restore button. Click on View Status button to monitor the progress. 8. Testing Backup and Restore - 83
88 Monitor the progress of the job using the Activity Monitor on NetBackup Server. Congratulations!! You have successfully taken restored volume. Following screen shot shows the restore operation is successful. 8. Testing Backup and Restore - 84
89 8. Testing Backup and Restore - 85
90 9. Performance Benchmarking Following performance tests were conducted on the IP SAN. No. Test Cases Average speed (Mb/sec) Peak speed (Mb/sec) A NetBackup Server & Client connected using LAN and NetBackup Server & Client are connected to IPSAN using Intel Gigabit NIC. 1 Backup from Local Disk Backup of NetBackup Servers local disk using Localdisk policy to IP SAN (NetBackup Volume) on NetBackup Server 2 Backup from Snapshot Volume Backup of Clients data (Source Volume) from the snapshot on IP SAN using Snapshot policy to IP SAN (NetBackup Volume) on NetBackup Server 3 Backup from Source Volume Backup of Clients data (Source Volume) on IP SAN using Regular policy to IP SAN (NetBackup Volume) on NetBackup Server Restore to IP SANDisk Restore from NetBackup Volume to IP SAN Source Volume Performance Benchmarking - 86
91 Case Study: Comparison of Backup Performance with Tape Media No. Media Mfg. Xfer Rate Realistic Xfer Rate 25 Gb Backup 1 4mm DDS Mb/s 01.2 Mb/s 5.80 hours 2 4mm DDS Mb/s 02.4 Mb/s 2.90 hours 3 AIT Mb/s 03.0 Mb/s 2.30 hours 4 AIT Mb/s 03.0 Mb/s 2.30 hours 5 DLT Mb/s 01.5 Mb/s 4.60 hours 6 DLT Mb/s 05.0 Mb/s 1.40 hours 7 DLT Mb/s 06.0 Mb/s 1.20 hours 8 SDLT Mb/s 11.0 Mb/s 0.65 hours 9 SDLT Mb/s 16.0 Mb/s 0.45 hours 10 LTO 32.0 Mb/s 16.0 Mb/s 0.45 hours 11 Intransa IP Mb/s 38.0 Mb/s 0.15 hours (Source: The above chart was taken from an online web resource; it is only intended to convey the difference between using tape as a backup medium and using the IP 5500 as a backup medium. Values represented may vary. The chart does give a general comparison in the difference of times to perform backup operations between tape and the IP Performance Benchmarking - 87
92 10. Summary Based on solution results, following are the conclusions drawn: Conclusions Summary NetBackup Server with IP SAN gives Backup peak performance of Mb/sec with average of Mb/sec. NetBackup Media Server with IP SAN gives Restore peak performance of Mb/sec with average of Mb/sec. Disk Storage configuration is flexible and can be easily tuned to the available disk space. Intransa VSS Provider works well with the NetBackup Software makes it possible to automatically start the snapshot for backup. The backup happens from the snapshot volume and Original source volume is available and remains online for the regular use. This helps immensely in shorting the backup window of mission critical volumes without bringing them offline for backup. Restore operation can be controlled using the option Restore everything to a different location to make sure the data is restored at the original source volume or the required destination. IT organizations can increase their productivity and decrease costs by implementing a disk-to-disk backup solution. The Intransa IP 5500 provides a robust platform for easily implementing and managing backups to disk. Veritas s NetBackup software was tested and performance difference was minimal for backup with a varying difference in restore times. Together it offers the extremely flexible and high performing fast backup solution for the enterprise. Veritas NetBackup Software seamlessly gets integrated with the Intransa VSS Provider. This gives immense benefit for configuring the Disk-to-Disk Backup Solutions with Intransa IP SAN in using the automated snapshot feature. 10. Summary - 88
93 The volume configuration tested under Windows 2003 with ATA internal disks for the source and an Intransa stripe of mirrors (RAID10) as the target for the backups. The IP 5500 was configured for optimal throughput based on initial testing by creating a stripe width of 64k per stripe member. The IP 5500 performed much better when compared to conventional tape media. It is important to note that only a single volume was used for the storage pool. If multiple volumes and backup streams were used then this number could potentially double being limited by only the software or source data read rate. From this minimal testing, the IP 5500 decreased backup times by 66% which drastically reduces the backup window for administrators. This has the added benefit of allowing IT staff to increase the numbers of backups or simply ease the management and cost of backups. This also insures that the backups are always online and easy accessible. For more information on specific configurations please contact your local Sales Representative or visit Summary - 89
94 11. Appendix A.VSS Concepts This section provides theory details of the technical concepts about Microsoft Virtual Shadow copy Service (VSS). A.1 What is VSS: Microsoft s Volume Shadow-Copy Service (VSS) provides a framework for creating a point-in time copy of a single volume or multiple volumes. It specifically aims to eliminate the problem of corrupt snapshots or backups due to open files. The Volume Shadow Copy Service (VSS) is an infrastructure that makes possible enhanced data protection though high fidelity backups, rapid data restores, and data transport. VSS is a component of the operating system, and as such, is not directly accessed by users. Instead the Volume Shadow Copy Service coordinates with user applications, backup applications and storage hardware to enable the creation of point-in-time shadow copies of data on single or multiple volumes without significantly impacting performance. Open files have historically been a backup administrator s biggest challenge, as they are often skipped or corrupted during the backup process. The alternative forcing open files closed or asking users to log out so applications can be shut down is no longer viable. Microsoft Windows Server 2003 VSS partially addresses this problem by allowing users to access certain files while a backup is taking place, without compromising the fidelity of the backup. (A drawback to VSS is that the files must be related to a VSS-aware application in order for all volumes to be synchronized to a single point in time,) Another feature of VSS is the ability for users to view and recover previous versions of their files without IT intervention. 11. Appendix - 90
95 By enabling read-only, point-in-time copies of an entire volume, the problem associated with backing up files that are open or in use would seem to be taken care of. That is Microsoft s intent, and in some situations, it is an intent that has the potential to be fulfilled. A.2 VSS Components Requestors o Invokes VSS to a create shadow copy Backup applications Shadow copy management applications Writers Represents Apps and Windows Services (i.e., SQL, Exchange, AD, etc.) o Differentiates VSS from competitors o Participate in shadow copy creation process Providers o Create shadow copies System provider Hardware snapshots A.3 How VSS works Microsoft Windows Server 2003 VSS works with applications that are in use to determine when a volume shadow-copy (snapshot) can be made. A snapshot is a copy of some data set, for example, a disk volume, at a point in time. VSS then communicates with the operating system and applications and freezes computing tasks to perform copy on write tasks on a sector-by sector basis. Without the freeze function, data could become corrupted when the snapshot is taken because the system might be in the middle of a task. Meanwhile, applications continue to run uninterrupted. The original volume continues to change as the process continues, but the shadow copy of the volume remains constant. VSS also gives permission to the backup application to access the volume and back it up in its frozen state. The shadow copy volume is then used for the actual backup. After the shadow copy volume is saved on the backup device, the shadow copy is deleted. The process uses free disk space on any NTFS volume (the file system used by Windows NT for storing and retrieving files) to store a record of the differences between the original volume and the shadow copy volume. If there isn t enough temporary disk space, the volume shadow copy cannot be completed and the backup program skips open files. 11. Appendix - 91
96 In order to ensure absolute data integrity for all volumes, especially those that are interrelated, the application, the backup program and the backup device should be VSS aware. This means that the components participating in the backup must be specifically programmed to work with VSS. Towards this end, Microsoft is providing a software development kit (SDK) to enable independent hardware and software vendors to interface their components, including applications, data stores, snapshot engines, and backup applications, with VSS. These components (the application, backup program, and storage software/hardware) are called writers, requestors, and providers, respectively, as described in more detail in the table below. VSS Component Description Requestor Writer Provider The requestor is backup software that initiates the creation and destruction of the shadow copy. The writer is any application software that participates in the shadow copy process and whose files and data are included in the process. The provider is the storage technology that does the actual shadow copy (snapshotting). Table: VSS Components All components of VSS --writers, requestors, and providers-- must be VSS-aware in order for VSS to be able to orchestrate the communication among them. The following diagram shows the three-way orchestration among shadow copywriters, requestors, and providers, as performed by VSS. 11. Appendix - 92
97 B. Overview to VSS and VDS Design There are two approaches to managing storage networks. One is to manage storage through some mechanism on the server; the other is to manage it through a separate storage product that interfaces with some hardware component of the storage network. Both VSS and VDS are designed to enable host-based and hardware-based solutions, as shown in Figure below. In this figure, Windows host software components are unshaded; third party vendor components are shaded. The additional details of this diagram are explained in later sections. Note that some of these components might not be present. 11. Appendix - 93
98 VSS and VDS Components in Windows Server 2003 Software Providers Software solutions implemented on the host computer are referred to variously as host-based or software solutions, or as software providers. Software providers can be supplied by third party vendors, or by Microsoft (and in some cases, both are present). In the latter case, this software is referred to as the system software provider, and is an in-box solution that ships with the product without requiring any additional installation steps. The advantage of host-based solutions is that they are inexpensive and easy to deploy. Updates and bug fixes are much simpler to manage, since they are part of the operating system service packs. However, host-based solutions do have drawbacks: one is that in high workload settings, the host can be overloaded and performance impaired; another is that advanced functionality might not be provided. Hardware Providers Hardware vendors have also developed their own storage management solutions. These solutions, known as hardware providers, can generally provide higher performance capabilities than solutions built into the system software, since the workload is offloaded to the external disk subsystem. Additionally, these solutions can provide maximum configuration flexibility, as well as advanced capabilities such as remote management. 11. Appendix - 94
99 C. Volume Shadow Copy Service The Volume Shadow Copy service provides an infrastructure for creating high fidelity, point-in-time images known as shadow copies. These copies of a single volume or multiple volumes can be made without affecting production server performance. VSS is able to produce high fidelity shadow copies through its coordination with business applications, backup applications, and storage hardware. Shadow copies can be used for a number of purposes: Rapid backup and restores. Individual file restores (using the Shadow Copy for Shared Folders feature). Transport (using a hardware provider) for tape backups, testing and data mining. VSS Components Involved in the Shadow Copy Creation Process Successful shadow copy creation requires the completion of a number of steps, the details of which are quite complex. This section outlines the components of the Volume Shadow Copy service requestors, writers and providers necessary for creating high fidelity shadow copies. 11. Appendix - 95
100 1) Requestors: Initiating Shadow Copy Creation The Volume Shadow Copy service is invoked by the requestor, software that initiates basic VSS functions such as creating, importing, breaking or deleting a shadow copy. Depending on the problem to be solved, different types of requestor applications are invoked: backup applications for VSS-enabled backups, management applications to manage shadow copy creation and usage, or utility applications designed to help solve other IT problems. (One such example is vrfydsk, which helps to verify whether chkdsk should be run). 2) Writers: Preventing Data Inconsistencies If, during the shadow copy creation process, an application writes to disk, data inconsistencies can occur, compromising the integrity of the point-in-time data image. The Volume Shadow Copy service has been designed to eliminate these drawbacks. Key to this design is the writer, an application-specific software module that acts to ensure that an application s data is consistent when a shadow copy is created. Under this design, the responsibility for data consistency has been shifted from the requestor application to the production application itself. The advantage of this approach is that application developers those most knowledgeable about their applications can ensure, through development of their own writers, maximum effectiveness of the shadow copy creation process. 3) Providers: Creating Shadow Copies In the context of shadow copy creation, a provider is the interface to the point-intime imaging capabilities, either on either the storage array (hardware-based) or in the operating system (software based). Windows Server 2003 includes a system software provider with shadow copy functionality in-box; alternatively, third party hardware and software vendors can develop their own hardware or software providers to provide point-in-time imaging functionality. Windows Server 2003 supports multiple hardware and software providers which can be used in combination to solve many different IT operational scenarios. VSS selects the provider to use during shadow copy creation using the following default hierarchy: hardware provider software provider system software provider. If a specific IT operational problem requires it, the requestor can override this hierarchy. 11. Appendix - 96
101 Coordination of Shadow Copy Creation: the Complete Sequence The various roles of the requestor, writer and provider are put into context in this section, which lists the steps that need to be taken to create a shadow copy. Overall coordination of the requestor, writer and provider is under VSS control. 1) The requestor notifies the VSS coordinator service to prepare for shadow copy creation. 2) The VSS coordinator notifies the application-specific writer to prepare its data for making a shadow copy. 3) The writer prepares the data in whatever way is appropriate for that application, such as completing all open transactions, rolling transaction logs, and flushing caches. 4) When the data is prepared for shadow copy creation, the writer notifies the VSS coordinator. 5) The VSS coordinator relays the message to the requestor, and the requestor initiates the commit snapshot phase. 6) The VSS coordinator temporarily halts (quiesces) application I/O write requests (I/O read requests are still possible) for the several seconds required to create the shadow copy of the volume or volumes. 7) The provider creates the shadow copy (a maximum of 10 seconds). 8) After the shadow copy is created, the VSS coordinator releases the writer from its temporary quiescent phase. 9) All queued write I/Os are completed. 10) VSS queries the writers to confirm that write I/Os were successfully held during shadow copy creation. 11) If the writes were not successfully held (meaning the shadow copy data is potentially inconsistent), the shadow copy is deleted and the requestor is notified. 12) The requestor can retry the process (loop back to 1) or notify the administrator to retry at a later time. As a direct result of steps 6 and 10-11, the VSS coordinator service ensures that the shadow copy is a highly consistent copy of the original data. Moreover, because all the preparation for making the shadow copy is completed prior to halting the application write I/Os, production performance is not impacted. VSS for Fast Backups and Restores The most common implementation of a requestor is a backup application. Backup applications can benefit from the application-aware design of VSS for a number of reasons. Some backup applications are designed to check the application data including metadata and log files for inconsistencies. Other backup applications do not implement consistency checks, and instead require the administrator to ensure that applications are closed before the backup 11. Appendix - 97
102 process. However, even the backup applications that do complete consistency checks have drawbacks: Excessive Time. Depending on the amount of data involved, the consistency check, done at the completion of a backup, can take hours. If, by the end of the check, inconsistencies are found, the backup must be redone. For many businesses, there simply is not the time. Complexity. Because each application SQL, Exchange, etc is designed differently, the location of the data, metadata and log files varies widely. Backup application developers have traditionally borne the responsibility of developing a reliable interface between the backup product and the data to correctly find and use this information. These companies have also been responsible for ensuring that application patches are captured and integrated into the backup application. These fixes are not always captured. Using the VSS infrastructure, backup application developers can take advantage of requestor and writer functionality. Together, these functionalities reduce the time and complexity involved in preparing data for backup and they ensure high fidelity point-in-time shadow copies that can be successfully and quickly restored. VSS for Individual File Restores The system administrator can make shadow copies available to end users through a feature called Shadow Copies for Shared Folders. The administrator uses the Properties menu (see Figure 4) to turn on the Shadow Copies feature, selects the volume(s) to be copied, and determine the frequency with which shadow copies are made. 11. Appendix - 98
103 D. Tape Backups: Limitations Until recently, backups to tape were the dominant technology for protecting data. While tape backups continue to be essential for long-term archiving solutions, they have a number of limitations that the storage manager should consider when planning and implementing effective data protection solutions: 1. Open files cannot be backed up. Open files must either be skipped during the tape backup process meaning the backup data is incomplete or the application must be closed ( cold backups), thereby disrupting user productivity. 2. Tape backups are time intensive. Because of the problems associated with backing up open files, backups are made during evening and weekend hours. However, as businesses amass greater quantities of mission critical data, increasingly long backup windows are required. For many businesses, this time simply does not exist information must be available 24x7. 3. Tape backups are often unsuccessful. Estimates of backup failures put the rate anywhere between 20 and 50% depending on the environment. Worse, it is all too common that backup failures are not discovered until the recovery process after production data has been corrupted or deleted. Poor backup success rates result from a number of factors, including poor media, open files, and incomplete backups (the backup window was too short) any of which the administrator may be unaware. 11. Appendix - 99
104 4. Tape restores are time intensive. Tapes must be found and retrieved from offsite storage. While restoring a full backup is relatively straightforward, differential and incremental backups are far more challenging. For those backup methods to work, all the correct tapes must be located and restored in the correct order. 5. Single file restores are costly. If an individual file is corrupted or accidentally deleted, the user can either rebuild the file or request that an earlier version be restored from tape. However, finding the most recent version of a file is a non-trivial process. Because tape media is read sequentially, the tape drive must first stream through all data physically ahead of the sought-after file. These limitations to tape backups can be circumvented using a relatively new technology, variously referred to as frozen imaging, point-in-time imaging, or snapshotting. Snapshots are fully useable disk-based copies that reflect the state of the original data at an earlier point-in-time. The Volume Shadow Copy service, new to Windows Server 2003 and Windows Storage Server 2003, is the infrastructure that provides built-in snapshotting (shadow copy) capabilities. Shadow copies created by Volume Shadow Copy service augment the storage administrator s tape backup archival solutions, providing high fidelity point-in-time copies that can be created and restored easily and effectively, thereby helping to simplify several aspects of storage and data management, as explained in the following section. High Fidelity Copies for Backup and Rapid Restores 1) Backups Shadow copy creation through the Volume Shadow Copy service is designed to be both an extremely fast means of creating a point-in-time image for backups on the order of seconds to a minute, depending on the amount of data and a process that produces high fidelity images without disrupting production servers. Because shadow copy creation is non-intrusive, point-in-time copies can be made more frequently than tape backups, thereby reducing the amount of time a businesses data is at risk should an outage occur. 2) Restores Scheduling non-disruptive tape backups has always been the system administrator s concern. Successful and rapid data restores, on the other hand, is a concern that the entire organization shares. Unfortunately, it is also the part of the process that most often fails. Recognizing this, organizations are taking steps to ensure that the more complex operation of data restoration from tape, which often must be done manually, is tested and proven effective before a problem arises. 11. Appendix - 100
105 Using shadow copies to restore data from disk provides a simple and extremely fast means of recovering data. The VSS infrastructure can be used to restore both large amounts of data, and individual files or folders: Large Data Restores. Shadow copies can protect single or multiple volumes from the risks of data loss. By default, shadow copies are read-only; in the event of data loss, they can be changed to read/write status and restored for use. Unlike tape restores, the shadow copy restore process is very rapid minutes rather than hours (or more). Individual File or Folder Restores. The Shadow Copies for Shared Folders feature lets administrators determine which volumes to copy and to set the frequency of shadow copy creation. The Previous Versions feature enables end users to quickly recover point-in-time copies of individual files or folders that have been accidentally deleted or overwritten. File recreation or lengthy single file restores from tape are unnecessary. Instead, end users can restore earlier versions of their own data by using a point and click process that takes only a few seconds. High Fidelity Backups The biggest cause of un-restorable backups is the lack of coordination between the backup application and end-user applications, such as databases. If applications are open and being written to during the backup, the saved data is inconsistent. VSS, with its shadow copy technology, solves this problem by coordinating with backup service and the application to ensure that no writes to disk are made during the backup process. Should there be a problem during the shadow copy creation, VSS notifies the requestor that the shadow copy is inconsistent, and the backup can be rescheduled. The net result of these two factors is high data integrity. Transport VSS enables several advanced storage management solutions based on the ability to transport data between servers accessing the same storage array. By design, storage allocated to one server is not accessible by another server; if it were, the stored data could be simultaneously written to by both servers, which would be disastrous. In order to share data between systems, the source data must be copied and the shadow copy made available to the second system. These shadow copies can then be used to: Offload backups to another server. Make a shadow copy of production database for testing purposes. Keep a shadow copy of data nearby for quick restore. The net result is enhanced data protection, and better data management. 11. Appendix - 101
106 E. Essentials of Veritas NetBackup Administration The NetBackup Administration Console provides a graphical-user interface through which the administrator can manage NetBackup. The console is available in two forms: A Windows-based interface to run on a Windows system. A Java-based interface able to run on a Windows system. This interface is called the NetBackup-Java Windows Display Console and is not automatically installed on the system. Installation is available on the main NetBackup for Windows installation screen. Using the NetBackup Administration Console The NetBackup Administration Console provides a Windows-based interface through which the administrator can manage NetBackup. 11. Appendix - 102
107 User Backups, Archives, and Restores To perform backups, restores and archives for this system and other clients, open the client interface by clicking on the Backup, Archive, and Restore button in the toolbar. Users can back up, archive, and restore files, directories, and raw partitions that reside on their own client computer. A user can restore files at any time but can back up and archive only during the time periods that the administrator defines with the schedules. Users can also view the progress and final status of the operations they perform. Activity Monitor Use the Activity Monitor to monitor and control NetBackup jobs, services, processes, and drives. E.1 NetBackup Management Reports Use Reports to compile information for verifying, managing, and troubleshooting NetBackup operations. Policies Use Policies to create and specify the backup policies which define the rules for backing up a specific group of one or more clients. For example, the backup policy specifies when automatic backups will occur for the clients and when users can perform their own backups. The administrator can define any number of backup policies, each of which can apply to one or more clients. A NetBackup client must be covered by at least one backup policy and can be covered by more than one. The properties of a backup policy include the following: General attributes that define the: Priority of backups for this policy relative to backups for other policies. Storage unit to use for backups of clients covered by this policy. Volume pool to use for backups performed according to this policy. A volume pool is a set of volumes that the administrator can assign to specific backup policies or schedules. For example, it is possible to have one volume pool for weekly backups and another for quarterly backups. List of client computers covered by the policy. 11. Appendix - 103
108 List of files to include in automatic backups of the clients. The backup selection list does not affect user backups because the user selects the files. Schedules that control when backups and archives can occur for the clients. As mentioned above, each backup policy has its own set of schedules. These schedules control when automatic backups start and also when users can start a backup or archive. Each schedule is unique with attributes that include: Type of schedule. Specify schedules for automatic full or incremental backups or user backups or archives. There are also schedule types that apply only when separately-priced options are installed (for example, a backup schedule for Microsoft Exchange or Oracle databases). Backup window. For automatic full or incremental backup schedules, this is the time period when NetBackup can start automatic backups of clients covered by this policy. For user schedules, this is the time period when users can start a backup or archive of their own client. Frequency. How often automatic and calendar-based backups should occur and which dates should be excluded from the schedule (dates when backups should not occur). Retention. How long NetBackup keeps the data that is backed up by this schedule. Storage unit. The storage unit for the data that is backed up by this schedule. This setting, if used, overrides the storage unit specified at the backup policy level. Volume pool. The volume pool to use when saving data backed up by this schedule. This setting, if used, overrides the volume pool specified at the backup policy level. The administrator can also manually start a backup schedule for an automatic full or incremental backup. Manual backups are useful if, for example, a client system is down and misses its scheduled backup. Configuring Backup Policies: The easiest way to set up a backup policy is to use the Backup Policy Configuration Wizard. This wizard guides you through the setup process, simplifying the process by automatically choosing default values that are good for most configurations. 11. Appendix - 104
109 Policy Planning Guidelines for Backups Policies allow you to meet the needs of a wide variety of clients in a single NetBackup configuration. However, taking full advantage of policies for use in backups requires careful planning before starting your configuration. The following procedure provides planning guidelines. 1. Divide clients into groups according to the types of work they perform. 2. Gather information about each client. Include information relevant to the backups such as the names, size, and number of files. 3. Create backup policies to accommodate special storage requirements. 4. Create additional backup policies if one set of schedules does not accommodate all clients and files. Best times for backups to occur. How frequently the files change. How long backups have to be retained. 5. Create separate policies for clients that require different general attribute settings than other clients. 6. Create separate policies as necessary to maximize the benefits of multiplexing. 7. Evaluate total backup times for each schedule and further subdivide your policies to reduce backup times to an acceptable level. When to Use Multiple Data Streams Reduce Backup Time Multiple data streams can reduce the backup time for large backups. This is achieved by splitting the backup into multiple streams and then using multiplexing, multiple drives, or a combination of the two for processing the streams concurrently. In addition, configuring the backup so each physical device on the client is backed up by a separate data stream that runs concurrently with streams from other devices can significantly reduce backup times. Note For best performance, use only one data stream to back up each physical device on the client. Multiple concurrent streams from a single physical device can adversely affect backup times because the heads must move back and forth between tracks containing files for the respective streams. 11. Appendix - 105
110 Setting the Number of Streams That Can Run Concurrently The number of streams that can run concurrently for a policy or client is determined by the following: Storage unit and schedule multiplexing limit Number of drives that are available Maximum concurrent jobs settings for the policy and client Each storage unit and each schedule has a maximum multiplex setting. The lower of the two settings is the limit for a specific schedule and storage unit. The maximum number of streams that can be multiplexed is limited to the sum of the multiplexing limits for all drives available in the storage unit and schedule combinations. For example, assume there are two storage units with one drive in each. MPX on storage unit 1 is set to 3 and MPX on storage unit 2 is set to 5. If MPX is set to 5 or greater in the schedules, then 8 streams can run concurrently. The maximum jobs settings also limit the maximum number of streams: Maximum Jobs Per Client (Host Properties > Master Server > Global NetBackup Attributes) Limit jobs per policy (policy attribute) Maximum Data Streams (Set the number in Host Properties > Master Server > Client Attributes) The maximum job settings are interdependent as follows: o If Maximum Data Streams is not set, the lowest value of Maximum Jobs Per Client and Limit Jobs Per Policy is the limiting factor. 11. Appendix - 106
111 o If Maximum Data Streams is set, then NetBackup ignores Maximum Jobs Per Client and uses the lowest value of Maximum Data Streams and Limit Jobs Per Policy as the limiting factor. Storage Units Use Storage Units to display storage unit information and provide commands for managing NetBackup storage units. A storage unit is a group of one or more storage devices of a specific type and density that attach to a NetBackup server. The media can be removable (such as tape) or a directory on a hard disk. Removable media can be in a robot or a standalone drive. The devices in a removable-media storage unit must attach to a NetBackup master or media server and be under control of Media Manager. The administrator first sets up Media Manager to use the drives, robots, and media and then defines the storage units. During a backup, NetBackup sends data to the storage unit specified by the backup policy. Media Manager then picks an available device within the storage unit. When the storage unit is a directory on a hard disk, the administrator specifies the directory during configuration and NetBackup sends the data to that directory during backups. Media Manager is not involved. Storage units simplify administration because once they are defined, the NetBackup configuration points to a storage unit rather than to the individual devices it contains. For example, if a storage unit contains two drives and one is busy, NetBackup can use the other drive without administrator intervention. Disk Storage Unit Considerations A disk type storage unit consists of a directory on a hard disk that stores the backup or archive data. NetBackup permits an unlimited number of disk storage units. A disk type storage unit is useful for testing and is useful during busy periods because it allows quick backups. However, you must be careful that it does not fill up your disk. Before using a disk storage unit, configure the disk as explained in your operating system documentation. To calculate the approximate disk space that NetBackup requires as it creates backups, use the following formula: (Largest backup size x (number of backups + 1)) + Space for the restores that are concurrent with backups 11. Appendix - 107
112 Catalog Use Catalog to create and configure a special type of backup NetBackup requires for its own internal databases a catalog backup. These databases, called catalogs, are on the NetBackup serverʹs disk and have setup information as well as critical information on client backups. The catalog backups are set up and tracked separately from other backups to ensure recovery in case of a server crash. Catalog is also used to search for a backup image in order to verify the contents of media with what is recorded in the NetBackup catalog, to duplicate a backup image, to promote a backup image from a copy to the primary backup copy, to expire backup images, or to import expired backup images or images from another NetBackup server. Host Properties Use Host Properties to customize NetBackup configuration options. In most instances, no setting changes are necessary. However, Host Properties settings allow the administrator to customize NetBackup to meet specific site preferences and requirements for master server, media servers, and clients. Media and Device Management The software that manages the removable media and storage devices for NetBackup is called Media Manager. This software is part of NetBackup and is installed on every NetBackup server. The administrator can configure and manage media through Media and Device Management in the NetBackup Administration Console. Access Management Customers can protect their NetBackup configuration by using Access Management to define who may access NetBackup and what functions a user in a user group can perform. 11. Appendix - 108
113 E.2 NetBackup Configuration Wizards The easiest way to configure NetBackup is to use the configuration wizards. The wizard selection is visible in the Details pane on the right varies depending on what NetBackup node is selected in the left portion of the screen. Getting Started Use the Getting Started Wizard if you are configuring NetBackup for the first time. It leads you through the necessary steps and other wizards to get you up and running with a working NetBackup configuration. Configure Storage Devices Use the Device Configuration Wizard to guide you through the entire process of configuring a device and storage unit. Configure Volumes Use the Volume Configuration Wizard to guide you through the entire process of configuring removable media. Configure the Catalog Backup Use the NetBackup Catalog Backup Wizard to set up your catalog backups, which are essential to recovering your data in case of a server failure or crash. Create a Backup Policy Use the Backup Policy and Configuration Wizard to add a backup policy to your configuration. Import Images Wizard Use the Import Images Wizard to import NetBackup images in a two-part process. Configure a Shared Drive Use the Device Configuration Wizard to configure NetBackup to use shared drives or to reconfigure an existing shared drive. 11. Appendix - 109
114 E.3 Disk Staging Storage Unit Considerations Disk staging provides a method for administrators to create images on disk initially, then later copy the images to another media type (as determined by the disk staging schedule). The later media type would typically be tape, but could be disk or disk staging. This two-stage process allows the NetBackup administrator to leverage the advantages of disk-based backups in the near term, while preserving the advantages of tape-based backups for long term. Disk staging may be appropriate for your NetBackup environment to meet the following objectives: To allow backups when tape drives are scarce. To allow for faster restores from disk. To facilitate streaming to tape without image multiplexing. Disk Staging is conducted in two separate operations: Stage I: A backup creates an image on the disk staging storage unit. Stage II: A relocation schedule determines when the image from the disk staging storage unit should be relocated to the destination storage unit. The image continues to exist on both the disk staging storage unit and the destination storage unit. File restores are done from the disk staging storage unit copy, while the destination storage unit copy can be considered the long term copy. 11. Appendix - 110
EMC CLARiiON Backup Storage Solutions
Engineering White Paper Backup-to-Disk: An Overview Abstract This white paper is an overview of disk-based backup methodologies. It compares disk and tape backup topologies and describes important considerations
More informationIntransa ADIC StorNext File Sharing Solution
Intransa ADIC StorNext File Sharing Solution Solution Document Document Title: Intransa ADIC StorNext File Sharing Solution Revision: 1.0 Document Number: INT-SE-050604-ML Disclaimer The information contained
More informationVERITAS Storage Foundation 4.3 for Windows
DATASHEET VERITAS Storage Foundation 4.3 for Windows Advanced Volume Management Technology for Windows In distributed client/server environments, users demand that databases, mission-critical applications
More informationEMC CLARiiON Backup Storage Solutions
Engineering White Paper Backup-to-Disk Guide with Computer Associates BrightStor Enterprise Backup Abstract This white paper describes how to configure the CLARiiON CX600, CX400, and CX200 storage systems
More informationWHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server White Paper: Enterprise Security Symantec
More informationContinuous Data Protection. PowerVault DL Backup to Disk Appliance
Continuous Data Protection PowerVault DL Backup to Disk Appliance Continuous Data Protection Current Situation The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry
More informationUsing HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup
Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP
More informationWHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server
WHITE PAPER PPAPER Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions for Microsoft Exchange Server 2003 & Microsoft SQL Server
More informationEMC CLARiiON Backup Storage Solutions
Engineering White Paper Backup-to-Disk Guide with VERITAS NetBackup Abstract This white paper describes how to configure the EMC CLARiiON CX200, CX400, and CX600 storage systems with VERITAS NetBackup
More informationPreface... 1. Introduction... 1 High Availability... 2 Users... 4 Other Resources... 5 Conventions... 5
Table of Contents Preface.................................................... 1 Introduction............................................................. 1 High Availability.........................................................
More informationEMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
More informationDisk-to-Disk Backup Solution
SSTG-AIM 2004 Disk-to-Disk Backup Solution Using CommVault QiNetix v5.0.0 with Adaptec Snap Server 4500 Storage Array Contents Introduction: The Data Protection Challenge...2 The Solution: Disk-to-Disk
More informationDrobo How-To Guide. Use a Drobo iscsi Array as a Target for Veeam Backups
This document shows you how to use a Drobo iscsi SAN Storage array with Veeam Backup & Replication version 5 in a VMware environment. Veeam provides fast disk-based backup and recovery of virtual machines
More informationUsing Symantec NetBackup with VSS Snapshot to Perform a Backup of SAN LUNs in the Oracle ZFS Storage Appliance
An Oracle Technical White Paper March 2014 Using Symantec NetBackup with VSS Snapshot to Perform a Backup of SAN LUNs in the Oracle ZFS Storage Appliance Introduction... 2 Overview... 3 Oracle ZFS Storage
More informationOPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006
OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006 EXECUTIVE SUMMARY Microsoft Exchange Server is a disk-intensive application that requires high speed storage to deliver
More informationProtect Microsoft Exchange databases, achieve long-term data retention
Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...
More informationSTORAGE CENTER WITH NAS STORAGE CENTER DATASHEET
STORAGE CENTER WITH STORAGE CENTER DATASHEET THE BENEFITS OF UNIFIED AND STORAGE Combining block and file-level data into a centralized storage platform simplifies management and reduces overall storage
More informationQuickSpecs. Models HP ProLiant Storage Server iscsi Feature Pack. Overview
Overview software adds iscsi target functionality to Server devices designed for small and medium businesses, enterprise departments and branch offices, and other environments wishing to implement low-cost
More informationSymantec NetBackup OpenStorage Solutions Guide for Disk
Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a
More informationInstallation Guide July 2009
July 2009 About this guide Edition notice This edition applies to Version 4.0 of the Pivot3 RAIGE Operating System and to any subsequent releases until otherwise indicated in new editions. Notification
More informationWHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION. SYMANTEC Backup Exec 10d Continuous Protection Server
WHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION SYMANTEC Backup Exec 10d Continuous Protection Server 1 TABLE OF CONTENTS EXECUTIVE SUMMARY...3 Current Situation...3 The New Opportunity...3 The
More informationStarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection
StarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright
More informationVERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION DATASHEET. Product Highlights
VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION As the recognized leader for enterprise-class backup and recovery, VERITAS NetBackup Enterprise Server software is designed to help provide
More informationUsing HP StoreOnce D2D systems for Microsoft SQL Server backups
Technical white paper Using HP StoreOnce D2D systems for Microsoft SQL Server backups Table of contents Executive summary 2 Introduction 2 Technology overview 2 HP StoreOnce D2D systems key features and
More informationEvery organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its
DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business
More informationQuantum StorNext. Product Brief: Distributed LAN Client
Quantum StorNext Product Brief: Distributed LAN Client NOTICE This product brief may contain proprietary information protected by copyright. Information in this product brief is subject to change without
More informationHP StorageWorks Data Protector Express versus Symantec Backup Exec white paper
HP StorageWorks Data Protector Express versus Symantec Backup Exec white paper A high-level comparison of features and functionality Introduction... 2 Overview... 3 Installation... 4 What is installed?...
More informationVERITAS NetBackup BusinesServer
VERITAS NetBackup BusinesServer A Scalable Backup Solution for UNIX or Heterogeneous Workgroups V E R I T A S W H I T E P A P E R Table of Contents Overview...................................................................................1
More informationDisaster Recovery Strategies: Business Continuity through Remote Backup Replication
W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication
More informationUsing HP StoreOnce Backup systems for Oracle database backups
Technical white paper Using HP StoreOnce Backup systems for Oracle database backups Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key features and benefits 2 HP StoreOnce
More informationWHITE PAPER: DATA PROTECTION. Veritas NetBackup for Microsoft Exchange Server Solution Guide. Bill Roth January 2008
WHITE PAPER: DATA PROTECTION Veritas NetBackup for Microsoft Exchange Server Solution Guide Bill Roth January 2008 White Paper: Veritas NetBackup for Microsoft Exchange Server Solution Guide Content 1.
More informationan introduction to networked storage
an introduction to networked storage How networked storage can simplify your data management The key differences between SAN, DAS, and NAS The business benefits of networked storage Introduction Historical
More informationVERITAS Backup Exec 9.0 for Windows Servers
WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS
More informationSection 1: Preface... 1. Introduction... 1 Users... 1 Other Resources... 2 Conventions... 2 Icons... 2 Text... 2
Table of Contents Section 1: Preface........................................... 1 Introduction............................................................. 1 Users...................................................................
More informationWHITE PAPER: customize. Best Practice for NDMP Backup Veritas NetBackup. Paul Cummings. January 2009. Confidence in a connected world.
WHITE PAPER: customize DATA PROTECTION Confidence in a connected world. Best Practice for NDMP Backup Veritas NetBackup Paul Cummings January 2009 Best Practice for NDMP Backup Veritas NetBackup Contents
More informationWHITE PAPER BRENT WELCH NOVEMBER
BACKUP WHITE PAPER BRENT WELCH NOVEMBER 2006 WHITE PAPER: BACKUP TABLE OF CONTENTS Backup Overview 3 Background on Backup Applications 3 Backup Illustration 4 Media Agents & Keeping Tape Drives Busy 5
More informationXenData Archive Series Software Technical Overview
XenData White Paper XenData Archive Series Software Technical Overview Advanced and Video Editions, Version 4.0 December 2006 XenData Archive Series software manages digital assets on data tape and magnetic
More informationDell High Availability Solutions Guide for Microsoft Hyper-V
Dell High Availability Solutions Guide for Microsoft Hyper-V www.dell.com support.dell.com Notes and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer.
More informationADVANCED NETWORK CONFIGURATION GUIDE
White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4
More informationVERITAS and HP A LONG-TERM COMMITMENT
VERITAS and HP A LONG-TERM COMMITMENT Hewlett-Packard holds the respect and trust of enterprises worldwide that depend on HP servers, storage, printers, and other equipment to run their businesses. HP
More informationEnterprise Backup and Restore technology and solutions
Enterprise Backup and Restore technology and solutions LESSON VII Veselin Petrunov Backup and Restore team / Deep Technical Support HP Bulgaria Global Delivery Hub Global Operations Center November, 2013
More informationWHITE PAPER: WINDOWS CUSTOMIZE PROTECTION. Confidence in a connected world. Windows Enterprise Data Protection with Symantec Backup Exec
WHITE PAPER: WINDOWS CUSTOMIZE PROTECTION Confidence in a connected world. Windows Enterprise Data Protection with Symantec Backup Exec White Paper: Windows Protection Windows Enterprise Data Protection
More informationVERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
More informationIBM System Storage DS5020 Express
IBM DS5020 Express Manage growth, complexity, and risk with scalable, high-performance storage Highlights Mixed host interfaces support (Fibre Channel/iSCSI) enables SAN tiering Balanced performance well-suited
More informationHP Data Protector Express Single Server Edition technical white paper
HP Data Protector Express Single Server Edition technical white paper Backup and recovery software exclusively for StorageWorks tape drives and tape autoloaders Table of contents Introduction... 2 Why
More informationOptimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems
Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec
More informationCA ARCserve Backup Agents and Options
PRODUCT SUMMARY: CA ARCSERVE BACKUP R12.5 AGENTS AND OPTIONS CA ARCserve Backup r12.5 Agents and Options خدةش شدزذ ءشءء خءحزدءز ذ باةب سسءج -ءجزدط سز ءءد ١٢.٥ ز ذصث ء ظ ضز س زء ء زصدس ز اءزدشس جصءز طدذ
More informationProtecting enterprise servers with StoreOnce and CommVault Simpana
Technical white paper Protecting enterprise servers with StoreOnce and CommVault Simpana HP StoreOnce Backup systems Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key
More informationSAP database backup and restore solutions for HP StorageWorks Enterprise Virtual Array using HP Data Protector 6.1 software
SAP database backup and restore solutions for HP StorageWorks Enterprise Virtual Array using HP Data Protector 6.1 software Table of contents Executive summary... 2 Solution overview... 2 Objectives...
More informationHP and Mimosa Systems A system for email archiving, recovery, and storage optimization white paper
HP and Mimosa Systems A system for email archiving, recovery, and storage optimization white paper Mimosa NearPoint for Microsoft Exchange Server and HP StorageWorks 1510i Modular Smart Array Executive
More informationAchieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
More informationHow to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems
W H I T E P A P E R How to Manage Critical Data Stored in Microsoft Exchange Server 2010 By Hitachi Data Systems April 2012 2 Table of Contents Executive Summary and Introduction 3 Mission-critical Microsoft
More informationDAS to SAN Migration Using a Storage Concentrator
DAS to SAN Migration Using a Storage Concentrator April 2006 All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc. which are subject to
More informationSection 1: Preface... 1. Introduction... 1 Users... 1 Assumptions... 2 Other Resources... 2 Conventions... 2 Icons... 2 Text... 2
Table of Contents Section 1: Preface........................................... 1 Introduction............................................................. 1 Users...................................................................
More informationQuick Start - Virtual Server idataagent (Microsoft/Hyper-V)
Page 1 of 31 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data
More informationWindows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication
More informationEMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 User Guide P/N 300-999-671 REV 02 Copyright 2007-2013 EMC Corporation. All rights reserved. Published in the USA.
More informationRedefining Microsoft SQL Server Data Management. PAS Specification
Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing
More informationHP LeftHand SAN Solutions
HP LeftHand SAN Solutions Support Document Application Notes Backup Exec 11D VSS Snapshots and Transportable Offhost Backup Legal Notices Warranty The only warranties for HP products and services are set
More informationIntegrating Data Protection Manager with StorTrends itx
Integrating Data Protection Manager with StorTrends itx INTEGRATING DATA PROTECTION MANAGER WITH STORTRENDS ITX 2 1. Introduction 2 2. Test Environment 2 Requirements 2 3. Setting up the Application Servers
More informationVeritas NetBackup 6.0 Database and Application Protection
Veritas NetBackup 6.0 Database and Application Protection Innovative data protection When it comes to database and application recovery, Symantec has a clear goal in mind simplify the complexity of database
More informationMicrosoft SQL Server 2005 on Windows Server 2003
EMC Backup and Recovery for SAP Microsoft SQL Server 2005 on Windows Server 2003 Enabled by EMC CLARiiON CX3, EMC Disk Library, EMC Replication Manager, EMC NetWorker, and Symantec Veritas NetBackup Reference
More informationStarWind iscsi SAN: Configuring Global Deduplication May 2012
StarWind iscsi SAN: Configuring Global Deduplication May 2012 TRADEMARKS StarWind, StarWind Software, and the StarWind and StarWind Software logos are trademarks of StarWind Software that may be registered
More informationDrobo How-To Guide. Use a Drobo iscsi Array as a Target for Veeam Backups
This document shows you how to use a Drobo iscsi array with Veeam Backup & Replication version 6.5 in a VMware environment. Veeam provides fast disk-based backup and recovery of virtual machines (VMs),
More informationConfiguring a Microsoft Windows Server 2012/R2 Failover Cluster with Storage Center
Configuring a Microsoft Windows Server 2012/R2 Failover Cluster with Storage Center Dell Compellent Solution Guide Kris Piepho, Microsoft Product Specialist October, 2013 Revisions Date Description 1/4/2013
More informationBEST PRACTICES GUIDE: VMware on Nimble Storage
BEST PRACTICES GUIDE: VMware on Nimble Storage Summary Nimble Storage iscsi arrays provide a complete application-aware data storage solution that includes primary storage, intelligent caching, instant
More informationUsing EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4
Using EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4 Application Note Abstract This application note explains the configure details of using Infortrend FC-host storage systems
More informationBackup architectures in the modern data center. Author: Edmond van As edmond@competa.com Competa IT b.v.
Backup architectures in the modern data center. Author: Edmond van As edmond@competa.com Competa IT b.v. Existing backup methods Most companies see an explosive growth in the amount of data that they have
More informationEnterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011
Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number
More informationUsing Data Domain Storage with Symantec Enterprise Vault 8. White Paper. Michael McLaughlin Data Domain Technical Marketing
Using Data Domain Storage with Symantec Enterprise Vault 8 White Paper Michael McLaughlin Data Domain Technical Marketing Charles Arconi Cornerstone Technologies - Principal Consultant Data Domain, Inc.
More informationVeritas NetBackup 6.0 Server Now from Symantec
Veritas NetBackup 6.0 Server Now from Symantec Innovative data protection As the recognized leader for enterprise-class backup and recovery, Veritas NetBackup Server software is designed to help provide
More informationIBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
More informationTECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage
TECHNICAL PAPER Veeam Backup & Replication with Nimble Storage Document Revision Date Revision Description (author) 11/26/2014 1. 0 Draft release (Bill Roth) 12/23/2014 1.1 Draft update (Bill Roth) 2/20/2015
More informationSTORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER
STORAGE CENTER DATASHEET STORAGE CENTER Go Beyond the Boundaries of Traditional Storage Systems Today s storage vendors promise to reduce the amount of time and money companies spend on storage but instead
More informationCONFIGURATION GUIDELINES: EMC STORAGE FOR PHYSICAL SECURITY
White Paper CONFIGURATION GUIDELINES: EMC STORAGE FOR PHYSICAL SECURITY DVTel Latitude NVMS performance using EMC Isilon storage arrays Correct sizing for storage in a DVTel Latitude physical security
More informationUse QNAP NAS for Backup
Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information
More informationSymantec NetBackup 7 Clients and Agents
Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency
More informationVERITAS Backup Exec 10 for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS
DATASHEET VERITAS Backup Exec 10 for Windows Servers AGENTS & OPTIONS VERITAS Backup Exec for Windows Servers is the Gold Standard in Windows data protection providing comprehensive, cost effective, certified
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationSymantec Backup Exec 11d for Windows Small Business Server Premium and Standard Editions
Symantec Backup Exec 11d for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and recovery for Microsoft Windows Small Business Server Today s small businesses
More informationStorage Backup and Disaster Recovery: Using New Technology to Develop Best Practices
Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,
More informationStorage Concentrator in a Microsoft Exchange Network
Implementing a Storage Concentrator in a Microsoft Exchange Network All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc. which are subject
More informationHow To Backup And Restore A Database With A Powervault Backup And Powervaults Backup Software On A Poweredge Powervalt Backup On A Netvault 2.5 (Powervault) Powervast Backup On An Uniden Power
Database Backup and Recovery using NetVault Backup and PowerVault MD3260 A Dell Technical White Paper Database Solutions Engineering Dell Product Group Umesh Sunnapu Mayura Deshmukh Robert Pound This document
More informationSymantec Backup Exec 11d for Windows Small Business Server Premium and Standard Editions
Symantec Backup Exec 11d for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and recovery for Microsoft Windows Small Business Server Today s small businesses
More informationSymantec Backup Exec 12 for Windows Servers
The gold standard in Windows data protection Overview Symantec Backup Exec 12 delivers efficient, easy-tomanage backup and recovery protection from server to desktop, providing optimized data protection
More informationVIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS
VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS Successfully configure all solution components Use VMS at the required bandwidth for NAS storage Meet the bandwidth demands of a 2,200
More informationWindows Server 2008 R2 Essentials
Windows Server 2008 R2 Essentials Installation, Deployment and Management 2 First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution
More informationBackup Exec 15 Agents and Options
DATA PROTECTION Backup Exec 15 Agents and Options Enhance and extend Backup Exec features, capabilities, and platform support Overview enhance and extend Backup Exec features, capabilities, and platform
More informationAgenda. Enterprise Application Performance Factors. Current form of Enterprise Applications. Factors to Application Performance.
Agenda Enterprise Performance Factors Overall Enterprise Performance Factors Best Practice for generic Enterprise Best Practice for 3-tiers Enterprise Hardware Load Balancer Basic Unix Tuning Performance
More informationAttix5 Pro Storage Platform
Attix5 Pro Storage Platform V6.0 User Manual Cover for Microsoft Windows Your guide to configuring the Attix5 Pro Storage Platform. SERVER EDITION V6.0 for MICROSOFT WINDOWS Copyright Notice and Proprietary
More informationBackup and Recovery With Isilon IQ Clustered Storage
Backup and Recovery With Isilon IQ Clustered Storage An Isilon Systems Best Practices Guide August 2007 ISILON SYSTEMS 1 Table of Contents 1. Assumptions... 4 2. Introduction... 4 3. Data Protection Strategies...
More informationEMC Backup and Recovery for Microsoft SQL Server
EMC Backup and Recovery for Microsoft SQL Server Enabled by EMC NetWorker Module for Microsoft SQL Server Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the
More informationEMC CLARiiON Backup Storage Solutions: Backup-to-Disk Guide with IBM Tivoli Storage Manager
EMC CLARiiON Backup Storage Solutions: Backup-to-Disk Guide with Best Practices Planning Abstract This white paper describes how to configure EMC CLARiiON CX Series storage systems with IBM Tivoli Storage
More informationION-NAS Network Storage Solutions
ION-NAS Network Storage Solutions Setup & Configuration Guide Powered by: 1 Table of Contents Setup & Configuration Guide... 1 Table of Contents... 2 Overview... 3 Getting your CIRRUS NVR ready for iscsi...
More informationSelling Compellent NAS: File & Block Level in the Same System Chad Thibodeau
Selling Compellent NAS: File & Block Level in the Same System Chad Thibodeau Agenda Session Objectives Feature Overview Technology Overview Compellent Differentiators Competition Available Resources Questions
More informationHow To Connect Virtual Fibre Channel To A Virtual Box On A Hyperv Virtual Machine
Virtual Fibre Channel for Hyper-V Virtual Fibre Channel for Hyper-V, a new technology available in Microsoft Windows Server 2012, allows direct access to Fibre Channel (FC) shared storage by multiple guest
More informationVERITAS Business Solutions. for DB2
VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................
More informationReference Architecture. EMC Global Solutions. 42 South Street Hopkinton MA 01748-9103 1.508.435.1000 www.emc.com
EMC Backup and Recovery for SAP with IBM DB2 on IBM AIX Enabled by EMC Symmetrix DMX-4, EMC CLARiiON CX3, EMC Replication Manager, IBM Tivoli Storage Manager, and EMC NetWorker Reference Architecture EMC
More informationHP ProLiant Storage Server family. Radically simple storage
HP ProLiant Storage Server family Radically simple storage The HP ProLiant Storage Server family delivers affordable, easy-to-use network attached storage (NAS) solutions that simplify storage management
More informationSymantec Backup Exec 2014 Agents and Options
Symantec Backup Exec 2014 Agents and Options Data Sheet: Data Protection Overview enhance and extend Backup Exec features, capabilities, and platform support. Whether you need to protect VMware vsphere,
More information